Abstract: An integrated circuit, a computer system, and a method for authorizing RMCP requests. The method includes receiving a request for a system action and initiating a timer. The method also includes generating an authorization request for the system action and evaluating a result of the authorization request for the system action if received before an expiration of the timer. The method also includes granting the request for the system action if the expiration of the timer occurs before the result of the authorization request for the system action is received.
Abstract: Apparati, methods, and computer readable media for authenticating an entity (9) in a shared hosting computer network (4) environment. A service provider computer (2) contains a plurality of entity sites (5). Connected to the service provider computer (2), a trusted third party computer (1) is adapted to provide a conglomerated authenticity certification to the service provider computer (2). Coupled to the trusted third party computer (1) is a means (10) for enabling an entity (9) to seek to convert the conglomerated authenticity certification into an individualized authenticity certification covering that entity's site (5).
Type:
Grant
Filed:
February 8, 2002
Date of Patent:
June 12, 2007
Assignee:
Verisign, Inc.
Inventors:
Kevin Trilli, Ben Golub, Owen Cheung, Wentsung Hsiao
Abstract: Disclosed herein are apparatuses and methods for generating pseudorandom numbers by making the existing ANSI and FIPS PRNGs forward secure and eliminating the need for re-keying them. A forward secure ANSI PRNG is created which includes an enhanced block cipher that is non-invertible even if the key becomes known and a function of the block cipher used in the existing ANSI PRNG. Additionally, the forward secure ANSI PRNG includes an enhanced next state that allows previous states to remain secret even when the key and the current state become known. A forward secure FIPS PRNG is created which includes a computation of an enhanced next state that is noninvertible.
Abstract: A system for controlling integrity measurement of an un-trusted system component on a client system includes a trusted management utility configured to measure the integrity of the un-trusted system component, a trusted fixed token resident on the client system, and a trusted registration service. The trusted registration service creates a signed hash of the trusted management utility software and stores the signed hash of the trusted management utility software in the trusted fixed token. The trusted registration service creates a security domain and stores the security domain in the trusted fixed token. The trusted fixed token creates a signed hash of the trusted management utility software and the security domain, and securely communicates the signed hash of the trusted management utility software and the security domain to the trusted registration service.
Abstract: A method of computing overhead associated with executing instructions on an out-of-order processor which includes determining when a first instruction retires, determining when a second instruction retires, and calculating an overhead based upon subtracting when the first instruction retired from when the second instruction retired.
Abstract: Method, system and computer program product for implementing a trusted counter in a personal communication device. In particular, the method, system and computer program product utilizes cryptography and an external, read-write storage device that stores important state information that cannot be modified without detection. Using the present invention, the counter can be implemented in a personal even if state information is stored in an insecure storage device.
Type:
Grant
Filed:
January 16, 2002
Date of Patent:
February 13, 2007
Assignee:
Nokia Corporation
Inventors:
Nadarajah Asokan, Jan-Erik Ekberg, Lauri Paatero
Abstract: The present invention provides embodiments for producing a user equipment identification scrambling sequence (UEIDSS). The produced sequences for different user identification codes have a high separation. A base station uses the UEIDSS to scramble a high speed shared control channel (HS-SSCH) and a user equipment (UE) uses the UEIDSS to descramble the HS-SSCH. The embodiments utilize various blocks for producing the codes. These blocks include Reed-Muller encoding, concatenation, rate matching, segmentation, convolutional encoding, tail bit discarding, zero padding, repeating, CRC calculation, quadratic residue coding, parity-check bit, shortening, puncturing and BCH encoding blocks.
Type:
Grant
Filed:
December 23, 2002
Date of Patent:
January 2, 2007
Assignee:
InterDigital Technology Corporation
Inventors:
Stephen G. Dick, Nader Bolourchi, Sung-Hyuk Shin
Abstract: A secure electronic messaging system permits communication between registered users, with the assistance of a key server. The system requires a recipient to submit key retrieval information to a key server, and obtain decryption key information. The decryption key information is necessary for the recipient to form the decryption key which is used to read a message encrypted by the sender. The decryption key information may be an encrypted version of a decryption key, or portions thereof, or may be portions of an unencrypted version of a decryption key, among others. Typically, the key retrieval information may either be sent to the recipient by the sender, or may be generated by the recipient, based on information sent by the sender.
Type:
Grant
Filed:
February 5, 2002
Date of Patent:
December 5, 2006
Assignee:
Surety, LLC
Inventors:
Dimitrios Emmanouil Andivahis, Shawn Michael Edwards Carnell, Addison McElroy Fischer, Albert John Wettlaufer